next up previous
Next: About this document ... Up: COMP 5407 Project 2: Previous: Conclusions

Bibliography

Adams and Sasse, 1999
Adams, A. and Sasse, M. A. (1999).
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures.
Communications of the ACM, 42(12):40-46.

Chick, 2003
Chick, D. (2003).
P for passwords.
TheNetworkAdministrator.com.
http://www.thenetworkadministrator.com/passwords.htm Accessed Nov 23, 2003.

Clear, 2002
Clear, T. (2002).
Design and usability in security systems: daily life as a context of use?
ACM SIGCSE Bulletin, 34(4):13-14.
COLUMN: Thinking issues.

Dourish et al., 2003
Dourish, P., de la Flor, J. D., and Joseph, M. (2003).
Security as a practical problem: Some preliminary observations of everyday mental models.

Ebbinghaus, 1885
Ebbinghaus, H. (1885).
Über das gedächtnis: Intersuchungen zur experimentellen psychologie.
Translated by H. A. Ruger and C. E. Bussenius, 1913 and reissued by Dover Publications, 1964.

FIPS, 1985
FIPS (1985).
Password usage (publication 112).
Federal Information Processing Standards Publication.

Flechais et al., 2003
Flechais, I., Sasse, M. A., and Hailes, S. M. V. (2003).
Bringing security home: A process for developing secure and usable systems.
In ACM/SIGSAC New Security Paradigms Workshop, Switzerland.

Handley, 2002
Handley, C. (2002).
Inside security attacks are more frequent than external.
ITWeb: The technology news site.

Henson, 2002
Henson, V. (2002).
Howto encourage women in linux.
The Linux Documentation Project.

Jermyn et al., 1999
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. D. (1999).
The design and analysis of graphical passwords.
In Proceedings of the 8th USENIX Security Syposium, Washington, D.C.

Moreu, 1995
Moreu, R. (1995).
Hackers.
Directed by Iain Softley.

Nahorney and Gudmundsson, 2003
Nahorney, B. and Gudmundsson, A. (2003).
W32.sobig.f@mm.
Symantec Security Response.

Nielsen, 2000
Nielsen, J. (2000).
Security & human factors.
Jakob Nielsen's Alertbox.

Norman, 1988
Norman, D. A. (1988).
The Design of Everyday Things.
Basic Books, New York.

Patrick, 2002
Patrick, A. (2002).
Human factors of security systems: A brief review.

Patrick et al., 2003
Patrick, A. S., Long, A. C., and Flinn, S. (2003).
Hci and security systems.
In CHI 03 extended abstracts on Human factors in computer systems, pages 1056-1057.
Workshop session.

SANS, 2003
SANS (2003).
Password policy.
The SANS Security Policy Project.
Sample policies provided by the SANS Institute. Accessed Nov 27, 2003.

Sasse et al., 2001
Sasse, M., Brostoff, S., and Weirich, D. (2001).
Transforming the 'weakest link': A human/computer interaction approach to usable and effective security.
BT Technology Journal, (19):122-131.

Solso, 1998
Solso, R. L. (1998).
Cognitive Psychology, Fifth Edition.
Allyn and Bacon.

Taylor et al., 2002
Taylor, K., Oda, S., and Zhu, C. (2002).
Private communication.

Tognazzini, 2003
Tognazzini, B. (2003).
D'ohlt #2: Security d'ohlts.
Ask Tog.
Nielsen Norman Group.

Trickey, 1998
Trickey, F. L. (1998).
Secure sso: Dream on?
Information Security Magazine.

Yee, 2002
Yee, K.-P. (2002).
User interaction design for secure systems.



Terri 2004-01-05